• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

13 Fraud courses in Formby

Organisation Programme - How to identify and mitigate procurement fraud and corruption

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.

Organisation Programme - How to identify and mitigate procurement fraud and corruption
Delivered In-Person in InternationallyFlexible Dates
£7,000 to £9,000

Fraud should not happen, but it does. It can happen at the highest to lowest levels in an organisation. Recent surveys show that incidents of fraud are not decreasing. Fraud costs companies money and, perhaps even more importantly, reputational damage. The losers are not just the shareholders, suppliers, customers, etc, but society as a whole. This programme shows why frauds happen, how organisations put themselves at risk and what they can do to prevent it. This programme will help directors and others understand: The motives for committing fraud Directors' responsibilities for identifying and reporting fraud What types of frauds there are How frauds are perpetrated How they can be prevented How regulators deal with fraud Above all, the principal objective of this programme is to help make your organisation as secure as possible from the threat of fraud. 1 Motives for committing fraud - drivers of fraud Session objective: to understand why people might commit fraud Drivers of fraudulent behaviourAmbitionGreedTheftConceit? And more! 2 Accounting mechanisms that allow fraud Session objective: to review the elements of the accounting, internal control and management processes that allow creative accounting Income or liability? Asset or expense? Coding errors and misclassification Netting off and grossing up Off-balance sheet items 3 Structures that allow fraud Session objective: to consider company and trading structures that allow frauds to be perpetrated Group structures Trading structures Tax havens Importing and exporting 4 Interpretations and other non-compliance that allow fraud Session objective: to look at how creative interpretations of law and accounting practice may permit fraud The place of accounting standards Accounting policies Trading methods The place of auditing standards 5 Money laundering Session objective: to review what constitutes money laundering Types of money laundering Identifying laundering Preventing laundering 6 Preventing fraud - proper management structures Session objective: to review the place of proper corporate governance Corporate governance Company management structure Audit committees The place of internal audit 7 Preventing fraud - proper accounting Session objective: to review best accounting and auditing practice Accounting standards Internal accounting policies Adequacy of internal controls Internal audit 8 Preventing fraud - regulation Session objective: to look at how regulators aim to prevent fraud The regulatory environment Financial services regulation 9 Conclusion Course review Open forum Close 10 Course summary - developing your own cost action plan Group and individual action plans will be prepared with a view to participants identifying their cost risks areas and the techniques which can be immediately applied to improve costing and reduce costs

Fraud (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Organisation Programme - Bribery and corruption risk assessment

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud, corruption and associated financial crime and money laundering.

Organisation Programme - Bribery and corruption risk assessment
Delivered In-Person in InternationallyFlexible Dates
£7,000 to £9,000

Forensic Accounting for Frauds

5.0(10)

By GBA Corporate

Overview Corporate frauds have the inherent power to bring large organizations to their knees, cause huge monetary loss, prompt lawsuits followed by significant legal expenses, lead to the imprisonment of employees and deteriorate confidence in the market, governments, and institutions. In response, corporations and governments across the globe have stepped up their effort to inspect, prevent and penalize fraudulent practices; resulting in a greater emphasis on the domains of forensic auditing and accounting in the current economy. This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course

Forensic Accounting for Frauds
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

FORENSIC ACCOUNTING AND AUDITING

5.0(10)

By GBA Corporate

Overview This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course

FORENSIC ACCOUNTING AND AUDITING
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Corruption and Procurement Fraud Training Programmes

By Global Risk Alliance Ltd

Our In-Person training programmes provide students involved at any stage of operational processes, projects or procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption. Course objectives Our courses aims to increase and enhance delegates’ understanding of the various procurement fraud and corruption threats which impact upon them and the organisations, sectors and regions in which they operate and provide them with the tools necessary to risk assess and mitigate those threats.

Corruption and Procurement Fraud Training Programmes
Delivered In-Person in InternationallyFlexible Dates
Price on Enquiry

Insurance Risk Management

5.0(10)

By GBA Corporate

Overview For internal employees who want to understand and expand their roles related to financial reporting, as well as those who simply need a refresher on financial accounting, this course is the ideal way to get up to speed. By exploring concepts that go beyond basic accounting, this course will enable participants to approach financial auditing with renewed confidence. The programme will walk participants through an analysis of an organization's financial statements using case study exercises, where participants will calculate key ratios and analyze trends over time. Engaging in discussions on both historic and current fraud cases, participants will learn how to recognize “red flags” in financial statement reporting.

Insurance Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Session Border Controllers for engineers

5.0(3)

By Systems & Network Training

Session Border Controllers course description A hands on course covering Session Border Controllers with a focus on the technical workings of features commonly found in Session Border Controllers. Hands on practicals follow each major theory session. What will you learn Explain how Session Border Controllers work. Explain the SIP call flow using a SBC. Deploy Session Border Controllers Describe the features found in Session Border Controllers. Session Border Controllers course details Who will benefit: Technical staff working with SIP. Prerequisites: Definitive SIP for engineers Duration 2 days Session Border Controllers course contents SIP review Signalling, media, RTP, SIP, peer to peer, SIP proxies, SIP call flows. Hands on: SIP packet analysis. Session Border Controllers What is a SBC? SBC features, peering scenario, access scenario, NNI SBC, UNI SBC, enterprise SBC. Hands on: SBC call flows SBC topology hiding Header privacy, B2BUA. Hands on: Header analysis. Session control Call admissions, QoS, statistics and billing, redundancy and scalability. Hands on: SBC session control SBC and NAT NAT traversal, STUN, ICE, NAT and SIP, NAT and RTP. Hands on: SBC and NAT traversal. SBC and security DoS, access control, encryption, authentication, toll fraud, regulatory issues, lawful intercept. Hands on: Security. Interoperability mediation Manipulating SIP headers, IMS, IETF, TISPAN, SIP-I. SBC interworking.

Session Border Controllers for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Management of Risk (M_o_R) Practitioner: In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Practitioner: In-House Training The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Practitioner: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

FORENSIC ACCOUNTING FOR INSTITUTIONAL INVESTORS

By Behind The Balance Sheet

Our Forensic Accounting Course is designed to help investment analysts detect earnings manipulation. It focuses on creative accounting rather than conducting detailed forensic analysis but we explain the tools short sellers employ to detect fraud and some of the techniques we used at hedge funds to identify short opportunities.

FORENSIC ACCOUNTING FOR INSTITUTIONAL INVESTORS
Delivered In-Person in InternationallyFlexible Dates
Price on Enquiry

Educators matching "Fraud"

Show all 3
Amalfi Corporate Solutions Uk

amalfi corporate solutions uk

London

Based in Surrey we are Automated Penetration Testing specialists, cyber security advisors, GDPR consultants, virtual DPO’s, cyber security awareness trainers, password management guru's, email security kings and offer the most flexible and cost effective IT support for SME's Automated penetration testing from Pcysys, Cycognito and Neuralegion overcomes the limitations of traditional periodic human based penetration testing thus improving and maintaining your security posture. We offer solutions for automated penetration testing of your infrastructure with Pcysys Pentera, your applications with Neuralegion and your Web Attack Surface/Shadow IT with Cycognito . In response to questions related to automated penetration testing a research VP at Gartner is quoted “I think we can risk saying Pen testing as it is today will cease to exist” We work with customers large and small Image British Film Institute Image Image Image Image Data Protection Officer - DPO Services Innovative program - from one day per month - no long term contract - makes having your own DPO affordable. Support Services With no complex on-boarding process we simply take on what you have and run with it. We don’t do ‘packages’ or introduce complexity, our contract is two pages, our price is fixed and our service is top drawer. Automated Penetration Testing Automated Penetration Testing – the bad guys never sleep. It is no longer enough to test once a year or rely on outdated technologies to detect weaknesses and attacks. AI and ML with real-time detection are now must have technologies. Email Security Health Check - FREE 30 seconds is all it takes for this Email Security Health Check and it is FREE. Works for in-house/cloud hosted/O365/GSuite. Test to see which of 17 email bourne threats get through your defences. Security Services From fully managed security awareness training programs and managed email protection systems which automate removal of malicious content to simple endpoint malware we cover the whole spectrum. DMARC - FREE email protection recommended by City of London Police and Global Cyber Alliance It is FREE and just needs to be configured and enabled. It helps protect against phishing, Business Email Compromise, Whaling and Spoofing as well as reducing SPAM Get a Personal Service IT support contracts get a personal service rather than a helpdesk Our range of services, enterprise in class but delivered at an SME price point, are designed to help you protect your data whilst not breaking the bank. Why Amalfitech For SMB and Enterprise Our solutions are tailored to the size of the company whether small, medium or large. Our small and mid-size business solutions are designed with costs and sustainability in mind, so you won’t get offered a low entry point and then get hit with high cost professional services. Everything is upfront, open and above all we are honest. Run by Techies Our customer facing staff are techies. The company is owned by techies. We don’t do high pressure sales. We just offer great advice and service. No Weekend Rates Is your current support company taking you offline during the working day to fix problems, or charging out of hours/weekend rates for services? Our fixed price unlimited, all-inclusive remote support packages have no extra charge for problem solving out of hours or at weekends. . IT Security Specialists and IT Support We are a GDPR and Data protection consultancy, IT security specialists and IT support company for small businesses. We are run by techies for the benefit of techies. Virtual CISO and DPO GDPR, PECR and Compliance Managed Security Internal Fraud Prevention Automated Penetration Testing Security Awareness Training IT Support and Maintenance Cloud Cost and Performance Optimisation The 'IT Sanity Check' for CEO's Image Image IT Solutions We provide new and creative solutions to difficult problems. Our goal is to help you through the minefield of rhetoric and marketing to make the best choice you can make, within your budget and that above all it works. Automated Penetration Testing Attacker and Insider threat Detection Email Phishing Testing, Prevention and Training Email and File Encryption Email/File/SharePoint Backup and Archiving VOIP Unified Endpoint Management OS and Application Containerisation Anti-Malware

Liverpool Hope University

liverpool hope university

Liverpool

Liverpool Hope University pursues a path of excellence in scholarship and collegial life without reservation or hesitation. The University’s distinctive philosophy is to ‘educate in the round’ – mind, body and spirit – in the quest for Truth, Beauty and Goodness. Liverpool Hope University is distinctive in that it is the only university foundation in Europe (and the USA) where Catholic and Anglican colleges have come together to form an integrated, ecumenical, Christian foundation. It has happened in Liverpool and nowhere else in Europe largely because of the presence in the 1980s of two remarkable church leaders: Bishop David Sheppard, the Bishop of the Anglican Diocese, and Archbishop Derek Worlock, the Archbishop of the Catholic Archdiocese that extends from Liverpool across the north of England. They confessed their faith to each other and took their congregations to visit each other’s cathedrals, a symbolic act of Christians working together in the context of northern Irish religious sectarianism. When the three colleges (St Katharine’s 1844, Notre Dame College 1856 and Christ’s College 1964) came together the name ‘Hope’ was adopted came from Hope Street that links both cathedrals - a living parable of what can happen when Christians unite and work together for the common good. This year we celebrate 175 years since the founding of our first college in 1844; in that year there were only six universities in England (two of them medieval) but all of them did not admit women, Catholics or Jews. The founding colleges of Liverpool Hope University were among the first few institutions to begin opening up higher education to the vast majority of England’s population. The Anglican Bishops of Liverpool, going back to the founding Bishop, Bishop Ryle, were all evangelicals. The friendship of the Anglican Bishop and the Catholic Archbishop was largely based on both their sharing of a mutual faith and their commitment to the poor. This adherence to historic Christian faith remains the university’s own commitment as it seeks to live out that faith in its life and work in a secularised British academy. At the beginning of each academic term we hold a Foundation Service to restate our foundational mission and values. Our Graduation ceremonies are held in alternating years in both the Anglican and Catholic Cathedrals in Liverpool.The new name of Liverpool Hope University was chosen to represent the ecumenical mission of the Institution. Liverpool Hope University was born in July 2005, when the Privy Council bestowed the right to use the University title. Research Degree Awarding Powers were granted by the Privy Council in 2009.